Articles about Security

Dridex botnet hacked to deliver free antivirus software

NurseRobot

Widely used by cyber criminals to introduce malware onto systems, the Dridex banking trojan has been subject to a number of high profile investigations, and a takedown by US authorities last year.

These things don't stay dead for long, however, and Dridex is back in business. But in an interesting new twist it seems that the Dridex botnet has been hijacked to deliver the free Avira antivirus program rather than its more usual malicious payload.

Continue reading

Here's how to bypass the iOS lock screen passcode

iphone_in_hand

There are numerous ways to keep your smartphone safe from prying eyes, and a lock screen protected with a passcode is a popular choice. But a newly discovered vulnerability in iOS 8 and iOS 9 means that iPhones and iPads could be accessed by attackers.

The vulnerability was discovered by security analyst Benjamin Kunz Mejri and it has been assigned a Common Vulnerability Scoring System (CVSS) count of 6.0, as well as a 'high' severity rating. Apple has been aware of the issue since late last year, but has yet to issue a patch.

Continue reading

Why the Internet of Things is a security nightmare

surprise shock woman laptop

The good guys over at Context Information Security have cracked Motorola’s outdoor security camera just to point out how the Internet of Things is still a completely unsecure industry that needs serious work.

The camera that got cracked was the Motorola Focus 73, and not only did the researchers manage to get inside, but they also managed to obtain the home network’s Wi-Fi password, take full control of the camera’s movement and even redirect the video feed.

Continue reading

Brits say their smartphone data is worth £6,504

iPhone in Red leather case held in left hand, tapped on the screen

Choosing between the wallet and the smartphone, the majority of Brits would rather have their wallet stolen, a new research by the Ponemon Institute and Lookout has found.

But that’s not because of the smartphone’s quality, value or price. It’s what’s inside that counts.

Continue reading

The future of the NSA: fight the hackers or embrace the hackers

red_pill_blue_pill

With its well-known habit of uncompromising surveillance, the NSA has earned itself something of a poor reputation among internet users. But while the spying side of the agency is what it is most famous for, it is actually made up of two different divisions: offensive and defensive.

Later this week the NSA is expected to announce an internal restructuring that will see the two divisions merging. This presents the agency with an interesting predicament: does it continue to work to fight the efforts of hackers, or does it adopt hacker-like techniques to help gather data? Experts says that the merger is a mistake, largely because the aim and modus operandi of the two departments are diametrically opposed.

Continue reading

NSA's lead hacker offers security tips

Faceless cyber criminal hacker

An interesting talk happened recently during the Usenix Enigma security conference in San Francisco. It was held by Rob Joyce, basically the number one hacker of the US. He is the head of NSA's Tailored Access Operations, or TAO. That's pretty much the government's hacking team, tasked with breaking and entering into the systems of its enemies. Or allies, if need be.

This man, who assumed the position of hacker-in-chief just a few months before Edward Snowden blew the whistle on the whole ordeal, spoke about a lot of things which Wired summed up in one smart sentence -- he explained how to keep people like him out of your systems.

Continue reading

Risk of malware infection growing in UK

Malware spy

UK's businesses have had a bigger chance of being attacked by a malware than those in the US or the Republic of Ireland in December 2015, a new report by security researchers suggest.

According to a report by Check Point, in December 2015, UK was the 99th most attacked country globally, surpassing the US (122nd) and the Republic of Ireland (116th).

Continue reading

New cloud service helps organizations meet document preservation requirements

Secure document padlock

Companies increasingly face demands to keep documents in order to satisfy legal and compliance requirements. This can present problems in deciding what to keep but also in keeping up with the latest regulations.

The latest EU/US Data Transfer negotiations for example are causing businesses to re-think their current business processes and data governance strategy in order to address these changes.

Continue reading

Snooper's Charter is vague and confusing

confused-confusion

A group of MPs has criticized plans put forward in the Draft Investigatoy Powers Bill after consulting with several top technology firms, including the likes of Apple, Facebook and Google.

The Science and Technology committee has slammed the bill as being vague and confusing, issuing a 43-page report outlining its views on key issues such as encryption and data collection.

Continue reading

New risk management software helps companies handle sensitive data

High Risk

Endpoint security and digital investigations specialist Guidance Software is launching a new solution to help organizations identify and classify confidential data.

EnForce Risk Manager allows organizations to reduce their surface area of risk, limiting the potential damage from breaches and improving their ability to comply with global data protection rules.

Continue reading

Android 6.0 Marshmallow update brings Adblock Plus to Samsung phones and tablets

adblock_plus_samsung

Earlier today we learned that a new API is bringing adblocking to Samsung's own mobile web browser. Adblock Fast was the first to take advantage of the new option and now, hot on its heels, comes the big guns -- Adblock Plus.

Today Samsung is rolling out an Android 6.0 Marshmallow update and once this has been installed, Adblock Plus can also be installed. The extension brings content blocking capabilities to Samsung's own web browser, but you'll have to jump through the relevant hoops to gain the privacy and bandwidth preserving capabilities.

Continue reading

DDoS attacks are now more sophisticated

DDoS attack start

Kaspersky Lab has released its report into DDoS attacks for the fourth quarter of 2015, and it claims that the global reach of attacks shrunk, but the sophistication of those attacks grew.

According to the report, in the fourth quarter of 2015, resources in a total of 69 countries were attacked. In the previous quarter, that number stood at 79. Similar to the previous quarter, in the last three months of 2015 the majority of attacks (94.9 percent) took place in just ten countries, with the US, China and South Korea being the most affected of the bunch.

Continue reading

It's all a facade: Encryption may do nothing to reduce surveillance or increase privacy

Data encryption

Living in a technological age where there is a near-fanatical obsession with privacy, a move towards encryption seems to make perfect sense. While there have been calls from some governments to ban encryption and demands for decryption keys to be handed over, there is a drive by companies and online services to try to increase security and privacy with encryption.

But a new report (Don't Panic: Making progress on the encryption debate) from Harvard University's Berkman Center for Internet & Society suggests that encryption may be all but pointless when it comes to curtailing surveillance. While governments and surveillance agencies may balk at the idea of people using encryption to 'go dark' online, and many people embrace the idea as a means of increasing their privacy, the report suggests that the task of surveillance is not going to be made impossible, and could be helped by the Internet of Things (IoT).

Continue reading

BlackEnergy 3 malware targets Ukranian power facilities

Malware

The BlackEnergy malware first appeared in 2007 as a relatively unsophisticated program that that generated random bots to support Distributed Denial of Service (DDoS) attacks.

Endpoint security specialist SentinelOne has detected a new variant of the program which was used last month to attack a Ukranian power facility. It also believes that this latest variant may be state-sponsored.

Continue reading

Stop using Microsoft Edge's InPrivate mode if you value your privacy

Microsoft_edge_Windows_10

It's possible that you reached this article purely by chance, or you may have Googled 'how to change the default search engine in Microsoft Edge'. However you got here, the fact that you're reading this indicates that you're either interested in Windows 10's Edge, or actively use it -- and this means there's something you need to know.

If you fall into the latter camp and use Edge's InPrivate mode to cover your online tracks, you might want to think about changing your web browser. Edge has already got some stick for its lack of extension support -- "it's coming, it's coming!" Yeah, whatever... so's Christmas -- but now it turns out that InPrivate mode is a privacy nightmare. It is possible to peak behind the curtain and see which sites have been visited when using a browsing mode that should mask this.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.